summaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
authorSimo Sorce <simo@redhat.com>2013-08-27 09:28:14 -0400
committerPetr Viktorin <pviktori@redhat.com>2013-08-28 12:43:02 +0200
commit634823b9278a150e9fcc2920329da15a5a005168 (patch)
treeaf43f3f539f2d8f8b077de8a76b2af5f23dd1678
parent51a483084be40f9523fde80a616568e20fc643e7 (diff)
downloadfreeipa.git-634823b9278a150e9fcc2920329da15a5a005168.tar.gz
freeipa.git-634823b9278a150e9fcc2920329da15a5a005168.tar.xz
freeipa.git-634823b9278a150e9fcc2920329da15a5a005168.zip
kdb-princ: Fix memory leak
If we do not store the keys in the entry we need to free the array before continuing or the data is leaked. CoverityID: 11910 Fixes: https://fedorahosted.org/freeipa/ticket/3884
-rw-r--r--daemons/ipa-kdb/ipa_kdb_principals.c1
1 files changed, 1 insertions, 0 deletions
diff --git a/daemons/ipa-kdb/ipa_kdb_principals.c b/daemons/ipa-kdb/ipa_kdb_principals.c
index 66d434a5..38059d29 100644
--- a/daemons/ipa-kdb/ipa_kdb_principals.c
+++ b/daemons/ipa-kdb/ipa_kdb_principals.c
@@ -413,6 +413,7 @@ static krb5_error_code ipadb_parse_ldap_entry(krb5_context kcontext,
if ((*active_ua & ~IPADB_USER_AUTH_DISABLED) != IPADB_USER_AUTH_EMPTY
&& !(*active_ua & IPADB_USER_AUTH_PASSWORD)) {
/* This is the same behavior as ENOENT below. */
+ ipa_krb5_free_key_data(res_key_data, result);
break;
}